Talk:DNS cache poisoning

From Wikipedia, the free encyclopedia

[edit] Not Clear

The explanation about the poisoning techniques is not clear. Splendour 07:02, 28 June 2006 (UTC)

An example would help greatly. Nikle-on-wikipedia 17:59, 29 December 2006 (UTC)

[edit] Invalid Information

Under prevention and mitigation it is stated that end-to-end validation can be performed once a connection is setup. This isn't entirely true because DNS uses UDP for many of its queries which is a connectionless protocol there is no transport layer connection set up. However, public/private key transaction signatures can be used to validate queries.